Filters








13,095 Hits in 4.6 sec

A Secure Infrastructure for Service Discovery and Access in Pervasive Computing [article]

Jeffrey Undercoffer, Filip Perich, Andrej Cedilnik, Lalana Kagal, Anupam Joshi, Maryland Shared Open Access Repository, Maryland Shared Open Access Repository
2018
The system presented in this paper provides a communications and security infrastructure that goes far in advancing the goal of anywhere - anytime computing.  ...  Our work securely enables clients to access and utilize services in heterogeneous networks.  ...  CCML CCML CCML Any Medium CCML Service Manager CCML º ¿ Ð ÒØ× Û Ø Ò Ø ÓÒØ ÜØ Ó × Ò Ð Ë ÖÚ Å Ò Ö Ö ×ØÖ Ø ÓÒº ÐÐ ÒØ ØÝ³× ØØÖ ÙØ ×¸ØÓ Ò ÐÙ Ø Ú Ð ¹ ØÝ Ó Ø× ÖØ ¬ Ø ¸ Ö Ú Ð Ø Ø ÖÓÙ × Ò Ð ÕÙ ÖÝ ØÓ Ø Ô Ð ØÝ Å  ... 
doi:10.13016/m2cele-q69y fatcat:vu42y7uhyjaxrhniifuy2qkht4

Service Discovery in Pervasive Computing Environments

Fen Zhu, M.W. Mutka, L.M. Ni
2005 IEEE pervasive computing  
A survey and taxonomy of existing discovery protocols clarifies the open research problems for anytime, anywhere computing.  ...  But a network scope can't easily define the ambient ser-Pervasive computing environments pose unique service discovery challenges.  ...  ACKNOWLEDGMENTS We thank the anonymous editor and reviewers for their valuable comments to help us improve this article.  ... 
doi:10.1109/mprv.2005.87 fatcat:bjir2nkrmbhshec46nkyt2sb2q

Assessing Software Risks by Implementing Cloud Readiness and Benchmarking in the Pervasive Environments

2019 International Journal of Engineering and Advanced Technology  
This state of art will create a case for developing new models for access control, identity, trust, risk management in ubiquitous or pervasive computing environments.  ...  This research has been provisioned with the comprehensive focus on pervasive devices user interaction, access control modeling, identity management, trust and service discovery modeling.  ...  In next section, we deal with various models for risks, access, privacy, identity, and trust and service discovery. Section 4 provides an insight into various impacts of pervasive computing.  ... 
doi:10.35940/ijeat.a1024.1091s19 fatcat:cpfhspnoafhc3lz6qxeg5ba6vq

Extending Pervasive Devices with the Semantic Grid: A Service Infrastructure Approach

Tao Guan, Ed Zaluska, David De Roure
2006 The Sixth IEEE International Conference on Computer and Information Technology (CIT'06)  
This paper presents a service approach that extends pervasive devices with semantic Grid services by using a device-proxy-Grid system infrastructure.  ...  Grid computing provides a vision of accessing computational resources automatically on demand to deliver the services required with the appropriate quality.  ...  Our system infrastructure, enabling the pervasive device to access Grid services, tries to incorporate physical computing entities into a digital world.  ... 
doi:10.1109/cit.2006.91 dblp:conf/IEEEcit/GuanZR06 fatcat:zj3tlmp36jcgbetapvq7i3q65y

Enabling Secure Discovery in a Pervasive Environment [chapter]

Slim Trabelsi, Jean-Christophe Pazzaglia, Yves Roudier
2006 Lecture Notes in Computer Science  
Whereas this assumption is at the heart of many pervasive computing protocols and systems, the necessity of securing service discovery and the complexity of this task have been largely underestimated,  ...  The design space for introducing security features into a specific architecture, namely registry-based discovery systems, is then explored and assessed.  ...  In pervasive computing, context-awareness would typically be enabled through the access to a set of such services.  ... 
doi:10.1007/11734666_3 fatcat:ecg5tw7zurgv7izwhebkjz7u7i

A system architecture for pervasive computing

Robert Grimm, Tom Anderson, Brian Bershad, David Wetherall
2000 Proceedings of the 9th workshop on ACM SIGOPS European workshop beyond the PC: new challenges for the operating system - EW 9  
Pervasive computing, with its focus on users and their tasks rather than on computing devices and technology, provides an attractive vision for the future of computing.  ...  But, while hardware and networking infrastructure to realize this vision are increasingly becoming a reality, precious few applications run in this infrastructure.  ...  Acknowledgments We thank Mark Fiuczynski and Hank Levy for providing valuable feedback on earlier versions of this paper.  ... 
doi:10.1145/566752.566763 fatcat:jjkuzgu2gbdnzazcl222455zu4

A system architecture for pervasive computing

Robert Grimm, Tom Anderson, Brian Bershad, David Wetherall
2000 Proceedings of the 9th workshop on ACM SIGOPS European workshop beyond the PC: new challenges for the operating system - EW 9  
Pervasive computing, with its focus on users and their tasks rather than on computing devices and technology, provides an attractive vision for the future of computing.  ...  But, while hardware and networking infrastructure to realize this vision are increasingly becoming a reality, precious few applications run in this infrastructure.  ...  Acknowledgments We thank Mark Fiuczynski and Hank Levy for providing valuable feedback on earlier versions of this paper.  ... 
doi:10.1145/566726.566763 dblp:conf/sigopsE/GrimmABW00 fatcat:bgrtsscvf5f6joakeg2qzqwjwq

Semantics and knowledge grids: building the next-generation grid

M. Cannataro, D. Talia
2004 IEEE Intelligent Systems  
J ust as the Internet is shifting its focus from information and communication to a knowledge delivery infrastructure, we see the Grid moving from computation and data management to a pervasive, worldwide  ...  We attempt to forecast the evolution of computational grids into what we call the next-generation grid, with a particular focus on the use of semantics and knowledge discovery techniques and services.  ...  We thank those working in the knowledge grid research team: Carmela Comito, Antonio Congiusta, Carlo Mastroianni, Andrea Pugliese, Paolo Trunfio, and Pierangelo Veltri.  ... 
doi:10.1109/mis.2004.1265886 fatcat:m27hc2bn4bagrgbjcepiqiv3dm

Democratizing the Edge: A Pervasive Edge Computing Framework [article]

Reza Tourani, Srikathyayani Srikanteswara, Satyajayant Misra, Richard Chow, Lily Yang, Xiruo Liu, Yi Zhang
2020 arXiv   pre-print
participate in a large-scale computing ecosystem.  ...  In this paper, we discuss the design of Pervasive Edge Computing (PEC)--a democratized edge computing framework, which enables end-user devices (e.g., smartphones, IoT devices, and vehicles) to dynamically  ...  [9] , and Security-as-a-Service at the edge [10] .  ... 
arXiv:2007.00641v1 fatcat:rw2teal3jjdxlcbrany3ilxoum

Pervasive health care applications face tough security challenges

V. Stanford
2002 IEEE pervasive computing  
Dynamic connectivity, including device and service discovery, and equally agile information access middleware will be the sine qua non of enterprise pervasive computing.  ...  almost all complex pervasive systems use wireless networking in some form, often IEEE 802.11, and by nature must support dynamic device and service discovery.  ... 
doi:10.1109/mprv.2002.1012332 fatcat:rmcc4gjudvbpzc6fidez3niyre

SSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment

Moushumi Sharmin, Sheikh Ahamed, Shameem Ahmed, Haifeng Li
2006 30th Annual International Computer Software and Applications Conference (COMPSAC'06)  
SSRD is a secure resource discovery model for devices running in a pervasive computing environment. SSRD is based on a lightweight trust model. SSRD+ is an extension of the existing SSRD model.  ...  We also add a risk model to address challenges posed by the pervasive and ad hoc nature of the network. These models work together to make the entire discovery process lightweight and secure.  ...  Resource discovery is an essential part of devices running in a pervasive computing environment [10] .  ... 
doi:10.1109/compsac.2006.164 dblp:conf/compsac/SharminAAL06 fatcat:vkd2ebvhtzdytkreow3m26zn34

Pervasive content-centric wireless networking

Hanno Wirtz, Matteo Ceriotti, Benjamin Grap, Klaus Wehrle
2014 Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014  
Current communication approaches assume network associations as a prerequisite to both content discovery and access.  ...  SO-Fi, instead, realizes content-centric wireless networking by enabling pervasive content discovery before establishing a network infrastructure.  ...  ACKNOWLEDGEMENTS This work was funded by the Deutsche Forschungsgemeinschaft (DFG) and the DFG Cluster of Excellence on Ultra High-Speed Mobile Information and Communication (UMIC).  ... 
doi:10.1109/wowmom.2014.6918968 dblp:conf/wowmom/WirtzCGW14 fatcat:k2qi3guhgjee7fingzzfrmguze

The iBICOOP middleware: Enablers and services for emerging pervasive computing environments

Amel Bennaceur, Pushpendra Singh, Pierre-Guillaume Raverdy, Valerie Issarny
2009 2009 IEEE International Conference on Pervasive Computing and Communications  
The iBICOOP middleware provides core services for distributed content storage, partnerships, naming & discovery and multi-network communications management.  ...  also in the 3G IMS infrastructure in order to truly leverage both Telecoms networks and the Internet.  ...  Most service discovery protocols for pervasive computing require IP multicast support (e.g., SLP, SSDP) either for distributed advertisement/request, or for discovering a centralized repository in the  ... 
doi:10.1109/percom.2009.4912851 dblp:conf/percom/BennaceurSRI09 fatcat:rk72ypyefrhhvn6632udkzyht4

A Grid Service Infrastructure for Mobile Devices

Tao Guan, Ed Zaluska, David De Roure
2005 2005 First International Conference on Semantics, Knowledge and Grid  
One of the visions of Grid computing is to access computational resources automatically on demand to deliver the services required with appropriate quality.  ...  Because mobile devices are now increasingly common, an infrastructure is required to allow mobile devices to use Grid services, and thus enable the execution of complex resource-intensive applications  ...  At the same time, a similar requirement exists in pervasive computing.  ... 
doi:10.1109/skg.2005.10 dblp:conf/skg/GuanZR05 fatcat:buhucidufrcr7lnolodtjoaxcy

TOWARDS PERVASIVE COMPUTING ENVIRONMENTS WITH CLOUD SERVICES

Ahmed Youssef
2013 International Journal of Ad Hoc, Sensor and Ubiquitous Computing  
We propose an infrastructure and a protocol that incorporate pervasive computing environments with cloud services and show that by embedding the power of CC services into pervasive computing environments  ...  Consequently, a wide range of applications such as image processing, multimedia, and social networking are difficult to run in pervasive computing environments.  ...  Traditional method used to provide security for individual computers and small networks such as authentication and access control are in adequate for pervasive computing environments since they lack central  ... 
doi:10.5121/ijasuc.2013.4301 fatcat:x52wr6jznrbpve56gxnecn35cm
« Previous Showing results 1 — 15 out of 13,095 results